Saar is a bug bounty script combining the best tools for a smooth recon workflow.
- Install Saar and its dependencies
curl -fLSs -o /usr/local/bin/saar https://raw.githubusercontent.com/xthezealot/saar/main/saar.sh && saar update
- Configure dependencies:
- To find more subdomains, add API keys to
$HOME/.config/subfinder/provider-config.yaml
- To find more hosts, add API keys to
$HOME/.config/uncover/provider-config.yaml
- To be notified of new findings, add your Telegram bot to
$HOME/.config/notify/provider-config.yaml
telegram: - id: "saar" telegram_api_key: "<API_KEY>" telegram_chat_id: "<CHAT_ID>" telegram_format: "{{data}}" telegram_parsemode: "MarkdownV2"
- To find more subdomains, add API keys to
For every new hunt:
- Make a new directory and move in
- Create a
scope.txt
file and add your targets (domain, IP, CIDR, ASN), one per line - Run
saar
(you can skip steps with-skip
flags)
Tip: Sometimes a large number of garbage subdomains are found, and you want to filter them out manually so as not to waste time. In this case, split the workflow:- Stop after subdomains have been found:
saar -skip uncover -skip portscan -skip wordlists -skip http -skip vulns
- Remove garbage
- Carry on:
saar -skip subs
- Stop after subdomains have been found:
- Once the scan is complete, see:
ports.txt
for open portsports.gnnmap
for additional port info from Nmaphttp.txt
(and thehttp
directory) for successful HTTP requests (use commandsaar pphttp
for a better view)secrets.txt
for secret keys found in HTTP responsesvulns.txt
for common vulnerabilities found by scanners
- Find an interesting entry point and get to work
_________ _____ ______
/ ___/ __ `/ __ `/ ___/
(__ ) /_/ / /_/ / /
/____/\__,_/\__,_/_/ v1.0.0
Saar is a bug bounty script that discovers targets from a scope and performs all the usual scans.
Usage:
saar <command> [flags]
Commands:
pphttp pretty print http.txt results
update update saar and its dependencies
Flags:
-s, -skip string skip a step (flag can be used multiple times) (choices: subs, uncover, portscan, wordlists, http, vulns)